After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.
What countermeasures could he take to prevent DDoS attacks?
A.
Enable BGP
B.
Disable BGP
C.
Enable direct broadcasts
D.
Disable direct broadcasts
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.
What countermeasures could he take to prevent DDoS attacks?
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.
What countermeasures could he take to prevent DDoS attacks?
A.
Enable BGP
B.
Disable BGP
C.
Enable direct broadcasts
D.
Disable direct broadcasts